loader

10 Tips to prevent hacks

September 2021

Below, you will find an overview of the essential tips that you should always take to heart to protect your organization with internet-enabled devices and ensure that surfing is unobstructed. Mobile devices such as laptops, smartphones, tablets or wearables must be just as secure as a stationary computer.

Important tip: Take enough time to familiarize yourself with the security tips and setting up a cyber security protocol in your organization. This time will be worthwhile in order better to protect yourself against possible attacks from the Internet. Unfortunately, there is no one hundred percent protection against these hazards. However, there are several things you can do yourself to limit the risks as much as possible. We will show you what protective measures these are.

Protective Measures

1. Use a Firewall.

A firewall is a key to your business. Without a firewall, the digital door of your company is, in principle, always open. Open to your customer data and your company’s private data. A firewall controls the incoming and outgoing traffic that wants to access or leave your network. The firewall determines which traffic is allowed or blocked. A firewall, therefore, protects your company when it comes to the security of your data or continuity and productivity. You won’t be the first (or the last) to have a cyber attack shut down the entire company or have to pay thousands of dollars to regain access to the network. For example, Maastricht University paid 200,000 euros in Bitcoins to hackers this year after malware was rolled out on the network. We recommend Netgate Firewalls with pfSense Plus. In Europe we choose 123firewalls, official Netgate Select Partner.

2. Install anti-malware software like Bitdefender.

A good virus scanner checks your computer non-stop for malicious software such as viruses and trojans. This non-stop checking prevents confidential business information from falling into the hands of ill-disposed parties. A virus scanner, therefore, works the moment a criminal has already invaded your network. A firewall and RDP Access Control protects your network before a cybercriminal invades the network. So they complement each other. Bitdefender.com and for Europe Bitdefender anti-virussoftware

3. Use multifactor identification.

MFA, sometimes referred to as two-factor authentication or 2FA, is a security enhancement that allows you to present two pieces of evidence – your credentials – when logging in to an account. More info? Click here

4. Protect your systems with RDP Access Control.

. A virus scanner works when a criminal has already invaded your network.
. A firewall and RDP Access Control protects your network as soon as a cybercriminal chooses to invade the network.
So they complement each other.

5. Regularly backup all data.

We recommend to backup word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files regularly. And at least weekly store backups outside of your company.
Based on your location, we can get you into contact with the nearest reseller. Click here

6 Enforce save password policies.

As much as 63 % of data breaches happened due to lost, stolen or weak passwords. The top 100 most common passwords include popular words, phrases and memes. Hackers collect long lists of these passwords and use them to make programs that attempt to break into accounts using these password dictionaries, one after another, trying thousands or millions of passwords a second. Through social media, hackers will find out your birthday, the name of your spouse or dog etc. Easy, it’s there to grab. It isn’t ‘just the complicated password that is important, but also the regularity of changing your password. All this together, that’s a password policy. Because you have to change your passwords regularly, it becomes more difficult to remember. For fighting memory loss, you can use a password manager such as Lastpass, Keypass or the like. Do you want a quote for LastPass, click here

7. Enhance mobile devices in your security protocol, and don’t forget wearables.

Employees also use mobile devices, USB sticks and wearables to store, to use as a browser, check mail with, listen to music—all possible threats to carry worms or viruses into your system. Without any malicious intent, employees will load their mobiles or wearables with their computers at work, not realizing the dangers they might inflict on the organization’s network. When a device only needs Internet (think of phones/tablets), it is best to use a separate WiFi network for mobile devices within the organization.

8. Educate employees, inform clients and suppliers.

Ensure that employees, clients, and suppliers know your cyber security plan and regularly inform them about when and why, like the blocking of zip files, giving examples of ‘wrong’ emails and instructing where to look for.

9. Write a cyber security protocol.

A cyber security plan specifies the security policies, procedures, and controls required to protect an organization against threats and risks. A cyber security plan can also outline the specific steps to take to respond to a breach. Like clear instructions on what to do when clicking on something wrong or weird. Like turning off your computer immediately and contacting your it employee.

10. Don’t sit back and relax.

Keep informed, stay on track with new methods of attack, constantly make sure to keep each software updated. Inform yourself about safer means of communication. Inform new employees and check if employees stick to the rules.